A dev decompiled the new White House app and found it loading arbitrary code from a random GitHub Pages account. A masterclass in what NOT to do.

So the US government just dropped a shiny new app for the White House. You'd think it boasts Pentagon-level security, right? Well, a curious dev decided to decompile it, and oh boy, the security nightmare that poured out is pure comedy gold. Grab your coffee, let's dive into this majestic f*ck-up.
Setting aside the political noise, a Redditor ripped the app apart and gave the verdict: it's janky, poorly written, and snoops around for way too much data.
But the absolute jaw-dropper, the one that made r/programming collectively facepalm, is this: This official government app literally loads code from a random personal GitHub Pages site belonging to some dude named lonelycpp.
And it executes this inside a WebView context. For the uninitiated, let me spell out the disaster: If that random GitHub account gets compromised (or if lonelycpp just feels chaotic evil one night), whoever controls that repo can serve arbitrary HTML and JS straight into the devices of everyone using the app. Instead of spinning up a secure cloud vps like normal people, they cheaped out and leeched off a random GitHub Page. Wild.
The devs on Reddit are having a field day roasting this masterpiece. The comments basically fall into a few camps:
lonelycpp now has the opportunity to do something really funny.Look, folks, this is a prime example of what NOT to do in production, even if you work for the literal President.
Here's the harsh truth for us code monkeys:
Alright, back to fixing my own bugs. Stay secure out there!